Astra Web Security Blog - Website & CMS Security News

astra, web, security, blog, website, cms, security, news

How Does the WordPress DoS Exploit Work?

Wordpress, one of the most popular content management systems in the world is rendered vulnerable to yet another vulnerability capable of bringing down an entire WordPress powered system. Statistically powering nearly 29% of the web, an unattended Wordpress vulnerability breeds serious consequences for businesses and websites. The Wordpress DoS Vulnerability The vulnerability (CVE-2018-6389) was discovered by Israeli researcher Barak Tawily. According to Tawily, the flaw…

All You Need to Know About Android App Vulnerability: Insufficient Cryptography

The Open Web Application Security Project (OWASP) has listed Insufficient Cryptography as the fifth most exploited risk in mobile applications. Insufficient Cryptography or insecure usage of cryptography is a common vulnerability in mobile apps that leverage encryption. Due to weak encryption algorithms or flaws within the encryption process, the potential hacker is able to return the encrypted code or sensitive data to its…

Tips to secure OpenCart on BlackFriday CyberMonday

Sales like BlackFriday, Thanksgiving and other ones have become a huge hit with coming of e-commerce. Billions of dollars are spent within a few days time during thanksgiving period on online shopping. You've prepared your OpenCart store well for the sales. Made sure that every product is in stock, coupon codes are ready and marketing is in full swings. However,…

20 Must- Know Hack Terminologies To Safeguard Your Online Business from Hackers

In today's times, an online presence makes one vulnerable to unprecedented cyber attacks and a variety of malicious attacks on both small and large scales. On a daily basis, we encounter countless incidents of data breaches, information disclosure, financial theft and failing businesses. One doesn't need to be technical minded to understand basic hacking terminologies which may one day render…

All You Need to Know About Android App Vulnerability: Improper Platform Usage

The Android App Vulnerability "Improper Platform Usage" is listed on the Owasp List of top 10 mobile vulnerabilities. It refers to misuse of a platform's feature or failure to use platform security controls. It includes Android intents, platform permissions, misuse of TouchID, the Keychain, or some other security control that is part of the mobile operating system. The vulnerability in this…

How to fix WordPress admin dashboard (wp-admin) hack

One of the worst feelings you can experience as a website owner is finding out that your website has been hacked. If proactive security measures are not taken - a hacker may be able to launch Pharma attacks, Phishing pages, Japanese SEO spam, Redirection Malware etc. through WordPress Admin panel hack. A new type of wp-admin hack has surfaced which adds an…

'Top 3 Most Critical Nginx Vulnerabilities Found'

Claiming to run 60 percent of the world's busiest websites, NGINX is often exalted as "the secret heart of the modern web". More than half of the Internet’s busiest websites including Airbnb, Box, Instagram, Netflix, Pinterest, SoundCloud, and Zappos rely on NGINX. Often web servers are the center of attraction for cyber criminals and they are constantly looking to exploit the slightest…

Close